On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

被引:6
|
作者
Dupuis, Sophie [1 ]
Di Natale, Giorgio [1 ]
Flottes, Marie-Lise [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] LIRMM UM2, CNRS, 161 Rue Ada, F-34095 Montpellier, France
来源
INFORMATION SECURITY JOURNAL | 2013年 / 22卷 / 5-6期
关键词
Hardware Trojan Horse (HTH); HTH detection; Side-channel analysis; Simulation;
D O I
10.1080/19393555.2014.891277
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan Horses (HTHs) are malicious and stealthy alterations of integrated circuits introduced at design or fabrication steps in order to modify a circuit's intended behavior when deployed in the field. Due to HTHs' stealth and diversity (intended alteration, implementation, triggering conditions), detecting and/or locating them is challenging. Several HTHs detection approaches have been proposed to address this problem. This paper focuses on so-called "side-channel analysis" methods, that is, methods that use power or delay measurements to detect potential HTHs. It reviews these methods and raises some considerations about the experiments made to evaluate them. Moreover, an original case study is presented in which we show that weak experiments may lead to misleading interpretations. Last, we evoke problems inherent to actual power and delay measurements.
引用
收藏
页码:226 / 236
页数:11
相关论文
共 50 条
  • [21] Variation-Aware Hardware Trojan Detection through Power Side-channel
    Hossain, Fakir Sharif
    Shintani, Michihiro
    Inoue, Michiko
    Orailoglu, Alex
    2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
  • [22] Sequential Hardware Trojan: Side-channel Aware Design and Placement
    Wang, Xinmu
    Narasimhan, Seetharam
    Krishna, Aswin
    Mal-Sarkar, Tatini
    Bhunia, Swarup
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 297 - 300
  • [23] A Multiobjective Approach for Side-Channel Based Hardware Trojan Detection Using Power Traces
    Mohanraj, Priyadharshini
    Paramasivam, Saravanan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (05) : 825 - 835
  • [24] A Hardware Trojan Detection Method for IoT Sensors Using Side-Channel Activity Magnifier
    Jedari, Esrafil
    Rashidzadeh, Rashid
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06) : 4507 - 4517
  • [25] Facilitating Side Channel Analysis by Obfuscation for Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 129 - 134
  • [26] An intelligent classification method for Trojan detection based on side-channel analysis
    Wang, Chenxu
    Li, Jinghu
    Yu, Mingyan
    Wang, Jinxiang
    IEICE ELECTRONICS EXPRESS, 2013, 10 (17):
  • [27] Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting
    Liu, Yu
    Huang, Ke
    Makris, Yiorgos
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [28] Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
    Lin, Lang
    Kasper, Markus
    Gueneysu, Tim
    Paar, Christof
    Burleson, Wayne
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 382 - +
  • [29] MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection
    Huang, Yuanwen
    Bhunia, Swarup
    Mishra, Prabhat
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 130 - 141
  • [30] A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data
    Nasr, Abdurrahman
    Mohamed, Khalil
    Elshenawy, Ayman
    Zaki, Mohamed
    SCIENTIFIC REPORTS, 2024, 14 (01):